Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Palo Alto Networks | Cloud NGFW | - | - | |
| Palo Alto Networks | Expedition | 1 ~ 1.2.100 | - | |
| Palo Alto Networks | Panorama | - | - | |
| Palo Alto Networks | PAN-OS | - | - | |
| Palo Alto Networks | Prisma Access | - | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | An OS command injection vulnerability in Palo Alto Networks Expedition enables an unauthenticated attacker to run arbitrary OS commands as the www-data user in Expedition, which results in the disclosure of usernames, cleartext passwords, device configurations, and device API keys for firewalls running PAN-OS software. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-0107.yaml | POC Details |
No public POC found.
Login to generate AI POC| CVE-2025-0103 | Expedition: SQL Injection Vulnerability | |
| CVE-2025-0104 | Expedition: Cross-Site Scripting (XSS) Vulnerability | |
| CVE-2025-0105 | Expedition: Arbitrary File Deletion Vulnerability | |
| CVE-2025-0106 | Expedition: Wildcard Expansion Vulnerability |
No comments yet